The MAL: A Malware Analysis Lexicon
暂无分享,去创建一个
[1] Rickard E. Faith,et al. A Dictionary Server Protocol , 1997, RFC.
[2] B. T. S. Atkins,et al. The Oxford Guide to Practical Lexicography , 2008 .
[3] N. E. Osselton,et al. Caught in the Web of Words. James A. H. Murray and the Oxford English Dictionary , 2002 .
[4] John C. Reynolds,et al. School of Computer Science , 1992 .
[5] Monica Borda,et al. Fundamentals in Information Theory and Coding , 2011 .
[6] Misbah ul Iman,et al. Anti-reversing as a tool to protect intellectual property , 2010, 2010 Second International Conference on Engineering System Management and Applications.
[7] Dave Aitel,et al. The Shellcoder's Handbook: Discovering and Exploiting Security Holes , 2004 .
[8] Gerald Midgley,et al. What Is This Thing Called CST , 1996 .
[9] Richard L. Kissel. Glossary of Key Information Security Terms | NIST , 2013 .
[10] David A. Mundie,et al. Building an Incident Management Body of Knowledge , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[11] Campbell B. Read,et al. Zipf's Law , 2004 .
[12] K. M. E. Murray. Caught in the Web of Words: James Murray and the Oxford English Dictionary , 1977 .
[13] Michael Ligh,et al. Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code , 2010 .
[14] Robert Lundrigan,et al. What is this thing called OPT , 1986 .
[15] Paul D Nielsen,et al. Software Engineering Institute: Year in Review 2008 , 2008 .
[16] Eldad Eilam,et al. Reversing: Secrets of Reverse Engineering , 2005 .
[17] M. Preda. Code Obfuscation and Malware Detection by Abstract Interpretation , 2007 .
[18] Shouhuai Xu,et al. Protecting cryptographic keys and functions from malware attacks , 2010 .
[19] Faye H. Clark,et al. A Controlled Vocabulary? , 1955 .
[20] James H. Cross,et al. Reverse engineering and design recovery: a taxonomy , 1990, IEEE Software.
[21] Daniel E. Geer,et al. Mobile Code Security , 1998, IEEE Internet Comput..